Search strategy: start broad with a CVE ID, vendor, product, attack type, or source name, then narrow by signal such as KEV, EPSS, exploited, public PoC, internet-facing, unauthenticated, no-patch, or source confidence.
Search
Search the portal with filters for type, exploit pressure, KEV linkage, and patch availability.
Use this as the main operator view when you know part of an identifier, vendor, product, or campaign name but not exactly where it belongs.
Fast queries
Good search terms
Try vendor names, product families, CVE IDs, attack tags like RCE or auth bypass, source names like CISA or NVD, and workflow terms like ransomware or appliance.
Save searches
Repeat investigations
Save filtered searches for recurring reviews such as KEV only, public PoC, no patch, internet-facing, identity, or a high-priority vendor.
Export
Move results into workflow
Use CSV/JSON export for offline review, ticket preparation, or sharing a filtered slice with another analyst.
Type
Signal
Source
Topic
Attack Type
Confidence
Guidance